From ff01793b05e970eb3b8bbdcd60e6035c43cbe122 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 29 May 2024 04:00:39 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/21xxx/CVE-2023-21677.json | 3 +- 2023/21xxx/CVE-2023-21678.json | 15 +++++- 2023/21xxx/CVE-2023-21679.json | 15 +++++- 2023/21xxx/CVE-2023-21680.json | 15 +++++- 2023/21xxx/CVE-2023-21681.json | 15 +++++- 2023/21xxx/CVE-2023-21682.json | 15 +++++- 2023/21xxx/CVE-2023-21683.json | 3 +- 2023/21xxx/CVE-2023-21708.json | 90 ++++++++++++++++++++++++++++++++-- 2023/21xxx/CVE-2023-21712.json | 3 +- 2023/21xxx/CVE-2023-21724.json | 3 +- 2023/21xxx/CVE-2023-21725.json | 3 +- 2023/21xxx/CVE-2023-21726.json | 15 +++++- 2023/21xxx/CVE-2023-21728.json | 15 +++++- 2023/21xxx/CVE-2023-21730.json | 15 +++++- 2023/21xxx/CVE-2023-21732.json | 15 +++++- 2023/21xxx/CVE-2023-21733.json | 3 +- 2023/21xxx/CVE-2023-21734.json | 3 +- 2023/21xxx/CVE-2023-21735.json | 3 +- 2023/21xxx/CVE-2023-21736.json | 3 +- 2023/21xxx/CVE-2023-21737.json | 3 +- 2023/21xxx/CVE-2023-21738.json | 3 +- 2023/21xxx/CVE-2023-21739.json | 3 +- 2023/21xxx/CVE-2023-21741.json | 3 +- 2023/21xxx/CVE-2023-21742.json | 3 +- 2023/21xxx/CVE-2023-21743.json | 3 +- 2023/21xxx/CVE-2023-21744.json | 3 +- 2023/21xxx/CVE-2023-21745.json | 3 +- 2023/21xxx/CVE-2023-21746.json | 12 +++++ 2023/21xxx/CVE-2023-21747.json | 15 +++++- 2023/21xxx/CVE-2023-21748.json | 12 +++++ 2023/21xxx/CVE-2023-21749.json | 15 +++++- 2023/21xxx/CVE-2023-21750.json | 15 +++++- 2023/21xxx/CVE-2023-21752.json | 3 +- 2023/21xxx/CVE-2023-21753.json | 3 +- 2023/21xxx/CVE-2023-21754.json | 15 +++++- 2023/21xxx/CVE-2023-21755.json | 3 +- 2023/21xxx/CVE-2023-21757.json | 15 +++++- 2023/21xxx/CVE-2023-21758.json | 3 +- 2023/21xxx/CVE-2023-21760.json | 15 +++++- 2023/21xxx/CVE-2023-21761.json | 3 +- 2023/21xxx/CVE-2023-21762.json | 3 +- 2023/21xxx/CVE-2023-21763.json | 3 +- 2023/21xxx/CVE-2023-21764.json | 3 +- 2023/21xxx/CVE-2023-21765.json | 15 +++++- 2023/21xxx/CVE-2023-21766.json | 3 +- 2023/21xxx/CVE-2023-21767.json | 3 +- 2023/21xxx/CVE-2023-21768.json | 3 +- 2023/21xxx/CVE-2023-21771.json | 3 +- 2023/21xxx/CVE-2023-21772.json | 15 +++++- 2023/21xxx/CVE-2023-21773.json | 15 +++++- 2023/21xxx/CVE-2023-21774.json | 15 +++++- 2023/21xxx/CVE-2023-21776.json | 15 +++++- 2023/21xxx/CVE-2023-21779.json | 3 +- 2023/21xxx/CVE-2023-21780.json | 3 +- 2023/21xxx/CVE-2023-21781.json | 3 +- 2023/21xxx/CVE-2023-21782.json | 3 +- 2023/21xxx/CVE-2023-21783.json | 3 +- 2023/21xxx/CVE-2023-21784.json | 3 +- 2023/21xxx/CVE-2023-21785.json | 3 +- 2023/21xxx/CVE-2023-21786.json | 3 +- 2023/21xxx/CVE-2023-21787.json | 3 +- 2023/21xxx/CVE-2023-21789.json | 3 +- 2023/21xxx/CVE-2023-21790.json | 3 +- 2023/21xxx/CVE-2023-21791.json | 3 +- 2023/21xxx/CVE-2023-21792.json | 3 +- 2023/21xxx/CVE-2023-21793.json | 3 +- 2023/21xxx/CVE-2023-21795.json | 3 +- 2023/23xxx/CVE-2023-23383.json | 41 +++++++++++++++- 2023/23xxx/CVE-2023-23385.json | 90 ++++++++++++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23388.json | 29 ++++++++++- 2023/23xxx/CVE-2023-23389.json | 3 +- 2023/23xxx/CVE-2023-23391.json | 5 +- 2023/23xxx/CVE-2023-23392.json | 5 +- 2023/23xxx/CVE-2023-23393.json | 17 ++++++- 2023/23xxx/CVE-2023-23394.json | 90 ++++++++++++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23395.json | 3 +- 2023/23xxx/CVE-2023-23396.json | 5 +- 2023/23xxx/CVE-2023-23397.json | 36 +++++++++++--- 2023/23xxx/CVE-2023-23398.json | 27 ++++++++-- 2023/23xxx/CVE-2023-23399.json | 86 ++++++++++++++++++++++++++------ 2023/23xxx/CVE-2023-23400.json | 39 ++++++++++++++- 2023/23xxx/CVE-2023-23401.json | 64 ++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23402.json | 64 ++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23403.json | 53 +++++++++++++++++++- 2023/23xxx/CVE-2023-23404.json | 53 +++++++++++++++++++- 2023/23xxx/CVE-2023-23405.json | 90 ++++++++++++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23406.json | 53 +++++++++++++++++++- 2023/23xxx/CVE-2023-23407.json | 64 ++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23408.json | 7 +-- 2023/23xxx/CVE-2023-23409.json | 90 ++++++++++++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23410.json | 90 ++++++++++++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23411.json | 38 +++++++++----- 2023/23xxx/CVE-2023-23412.json | 51 ++++++++++++++++++- 2023/23xxx/CVE-2023-23413.json | 53 +++++++++++++++++++- 2023/23xxx/CVE-2023-23414.json | 64 ++++++++++++++++++++++-- 2023/23xxx/CVE-2023-23415.json | 90 ++++++++++++++++++++++++++++++++-- 96 files changed, 1765 insertions(+), 181 deletions(-) diff --git a/2023/21xxx/CVE-2023-21677.json b/2023/21xxx/CVE-2023-21677.json index 91f1127b506..13488c60b04 100644 --- a/2023/21xxx/CVE-2023-21677.json +++ b/2023/21xxx/CVE-2023-21677.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-822: Untrusted Pointer Dereference", + "cweId": "CWE-822" } ] } diff --git a/2023/21xxx/CVE-2023-21678.json b/2023/21xxx/CVE-2023-21678.json index fac1b26ce96..6ba59b31a32 100644 --- a/2023/21xxx/CVE-2023-21678.json +++ b/2023/21xxx/CVE-2023-21678.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')", + "cweId": "CWE-59" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21679.json b/2023/21xxx/CVE-2023-21679.json index 39b2b65469a..bce40c4692d 100644 --- a/2023/21xxx/CVE-2023-21679.json +++ b/2023/21xxx/CVE-2023-21679.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21680.json b/2023/21xxx/CVE-2023-21680.json index 9bfcc57f19b..0cfc4581896 100644 --- a/2023/21xxx/CVE-2023-21680.json +++ b/2023/21xxx/CVE-2023-21680.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21681.json b/2023/21xxx/CVE-2023-21681.json index 35d8b5b1434..b8eab0d3ee8 100644 --- a/2023/21xxx/CVE-2023-21681.json +++ b/2023/21xxx/CVE-2023-21681.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-191: Integer Underflow (Wrap or Wraparound)", + "cweId": "CWE-191" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21682.json b/2023/21xxx/CVE-2023-21682.json index 930f685c427..5a3b1d59ed6 100644 --- a/2023/21xxx/CVE-2023-21682.json +++ b/2023/21xxx/CVE-2023-21682.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21683.json b/2023/21xxx/CVE-2023-21683.json index eb6f5fad5fc..0d179ba304c 100644 --- a/2023/21xxx/CVE-2023-21683.json +++ b/2023/21xxx/CVE-2023-21683.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-476: NULL Pointer Dereference", + "cweId": "CWE-476" } ] } diff --git a/2023/21xxx/CVE-2023-21708.json b/2023/21xxx/CVE-2023-21708.json index 49cf41bf0cb..e9663154b5e 100644 --- a/2023/21xxx/CVE-2023-21708.json +++ b/2023/21xxx/CVE-2023-21708.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-191: Integer Underflow (Wrap or Wraparound)", + "cweId": "CWE-191" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,7 +180,19 @@ } }, { - "product_name": "Windows Server 2008", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", "version": { "version_data": [ { @@ -179,14 +204,45 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2008 Service Pack 2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -207,6 +263,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -218,6 +286,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/21xxx/CVE-2023-21712.json b/2023/21xxx/CVE-2023-21712.json index 91345ab8a30..215e9e9d418 100644 --- a/2023/21xxx/CVE-2023-21712.json +++ b/2023/21xxx/CVE-2023-21712.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", + "cweId": "CWE-362" } ] } diff --git a/2023/21xxx/CVE-2023-21724.json b/2023/21xxx/CVE-2023-21724.json index 4a7a522216e..e7f71c1e89f 100644 --- a/2023/21xxx/CVE-2023-21724.json +++ b/2023/21xxx/CVE-2023-21724.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2023/21xxx/CVE-2023-21725.json b/2023/21xxx/CVE-2023-21725.json index 094cb9561bf..d8151bdaf71 100644 --- a/2023/21xxx/CVE-2023-21725.json +++ b/2023/21xxx/CVE-2023-21725.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')", + "cweId": "CWE-59" } ] } diff --git a/2023/21xxx/CVE-2023-21726.json b/2023/21xxx/CVE-2023-21726.json index 3c18b980495..e71fcdcda2b 100644 --- a/2023/21xxx/CVE-2023-21726.json +++ b/2023/21xxx/CVE-2023-21726.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-257: Storing Passwords in a Recoverable Format", + "cweId": "CWE-257" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21728.json b/2023/21xxx/CVE-2023-21728.json index e9bd6dafc29..278a17bdd20 100644 --- a/2023/21xxx/CVE-2023-21728.json +++ b/2023/21xxx/CVE-2023-21728.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-400: Uncontrolled Resource Consumption", + "cweId": "CWE-400" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21730.json b/2023/21xxx/CVE-2023-21730.json index a91324d476b..c63f0696c63 100644 --- a/2023/21xxx/CVE-2023-21730.json +++ b/2023/21xxx/CVE-2023-21730.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21732.json b/2023/21xxx/CVE-2023-21732.json index 7e0592184fc..16532219e8e 100644 --- a/2023/21xxx/CVE-2023-21732.json +++ b/2023/21xxx/CVE-2023-21732.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-121: Stack-based Buffer Overflow", + "cweId": "CWE-121" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21733.json b/2023/21xxx/CVE-2023-21733.json index 8ddd12e39b8..ac498b78f6c 100644 --- a/2023/21xxx/CVE-2023-21733.json +++ b/2023/21xxx/CVE-2023-21733.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21734.json b/2023/21xxx/CVE-2023-21734.json index fb4c400515b..6705e825fa4 100644 --- a/2023/21xxx/CVE-2023-21734.json +++ b/2023/21xxx/CVE-2023-21734.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2023/21xxx/CVE-2023-21735.json b/2023/21xxx/CVE-2023-21735.json index 20ac9f25532..23153124471 100644 --- a/2023/21xxx/CVE-2023-21735.json +++ b/2023/21xxx/CVE-2023-21735.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2023/21xxx/CVE-2023-21736.json b/2023/21xxx/CVE-2023-21736.json index 3576995bc65..c0f4c693c13 100644 --- a/2023/21xxx/CVE-2023-21736.json +++ b/2023/21xxx/CVE-2023-21736.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-681: Incorrect Conversion between Numeric Types", + "cweId": "CWE-681" } ] } diff --git a/2023/21xxx/CVE-2023-21737.json b/2023/21xxx/CVE-2023-21737.json index 86d67f56727..ed3b9e67c84 100644 --- a/2023/21xxx/CVE-2023-21737.json +++ b/2023/21xxx/CVE-2023-21737.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21738.json b/2023/21xxx/CVE-2023-21738.json index 17497d00787..62c9e795214 100644 --- a/2023/21xxx/CVE-2023-21738.json +++ b/2023/21xxx/CVE-2023-21738.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21739.json b/2023/21xxx/CVE-2023-21739.json index 074524985ca..d9f0c95b956 100644 --- a/2023/21xxx/CVE-2023-21739.json +++ b/2023/21xxx/CVE-2023-21739.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory", + "cweId": "CWE-591" } ] } diff --git a/2023/21xxx/CVE-2023-21741.json b/2023/21xxx/CVE-2023-21741.json index 60948a4f127..d72d0663fad 100644 --- a/2023/21xxx/CVE-2023-21741.json +++ b/2023/21xxx/CVE-2023-21741.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } diff --git a/2023/21xxx/CVE-2023-21742.json b/2023/21xxx/CVE-2023-21742.json index f73c3f00014..1eb2a18e443 100644 --- a/2023/21xxx/CVE-2023-21742.json +++ b/2023/21xxx/CVE-2023-21742.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" } ] } diff --git a/2023/21xxx/CVE-2023-21743.json b/2023/21xxx/CVE-2023-21743.json index 9a5e12b64e5..31f6dec9a33 100644 --- a/2023/21xxx/CVE-2023-21743.json +++ b/2023/21xxx/CVE-2023-21743.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Security Feature Bypass" + "value": "CWE-306: Missing Authentication for Critical Function", + "cweId": "CWE-306" } ] } diff --git a/2023/21xxx/CVE-2023-21744.json b/2023/21xxx/CVE-2023-21744.json index 45a602f61ee..345a368b967 100644 --- a/2023/21xxx/CVE-2023-21744.json +++ b/2023/21xxx/CVE-2023-21744.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-502: Deserialization of Untrusted Data", + "cweId": "CWE-502" } ] } diff --git a/2023/21xxx/CVE-2023-21745.json b/2023/21xxx/CVE-2023-21745.json index f4d1beff2b6..851c789f84b 100644 --- a/2023/21xxx/CVE-2023-21745.json +++ b/2023/21xxx/CVE-2023-21745.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-502: Deserialization of Untrusted Data", + "cweId": "CWE-502" } ] } diff --git a/2023/21xxx/CVE-2023-21746.json b/2023/21xxx/CVE-2023-21746.json index 3df6767ded8..b3ebecb69c3 100644 --- a/2023/21xxx/CVE-2023-21746.json +++ b/2023/21xxx/CVE-2023-21746.json @@ -238,6 +238,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21747.json b/2023/21xxx/CVE-2023-21747.json index 56a8edcf36e..2db468b9bf2 100644 --- a/2023/21xxx/CVE-2023-21747.json +++ b/2023/21xxx/CVE-2023-21747.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21748.json b/2023/21xxx/CVE-2023-21748.json index fe8a12e8dff..9f39912ce90 100644 --- a/2023/21xxx/CVE-2023-21748.json +++ b/2023/21xxx/CVE-2023-21748.json @@ -274,6 +274,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21749.json b/2023/21xxx/CVE-2023-21749.json index 87297a139fd..b42680c9fad 100644 --- a/2023/21xxx/CVE-2023-21749.json +++ b/2023/21xxx/CVE-2023-21749.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21750.json b/2023/21xxx/CVE-2023-21750.json index 4bcd6d049de..fad4e05d50e 100644 --- a/2023/21xxx/CVE-2023-21750.json +++ b/2023/21xxx/CVE-2023-21750.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21752.json b/2023/21xxx/CVE-2023-21752.json index e83e326ab88..d232b472b5b 100644 --- a/2023/21xxx/CVE-2023-21752.json +++ b/2023/21xxx/CVE-2023-21752.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" } ] } diff --git a/2023/21xxx/CVE-2023-21753.json b/2023/21xxx/CVE-2023-21753.json index eb65b4e13fa..8ad8ddb2dd4 100644 --- a/2023/21xxx/CVE-2023-21753.json +++ b/2023/21xxx/CVE-2023-21753.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-908: Use of Uninitialized Resource", + "cweId": "CWE-908" } ] } diff --git a/2023/21xxx/CVE-2023-21754.json b/2023/21xxx/CVE-2023-21754.json index a113b53f9df..b5ee5456736 100644 --- a/2023/21xxx/CVE-2023-21754.json +++ b/2023/21xxx/CVE-2023-21754.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21755.json b/2023/21xxx/CVE-2023-21755.json index 487e3f4807b..ab863b798be 100644 --- a/2023/21xxx/CVE-2023-21755.json +++ b/2023/21xxx/CVE-2023-21755.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2023/21xxx/CVE-2023-21757.json b/2023/21xxx/CVE-2023-21757.json index 360c234e3b8..631ac3dc7c3 100644 --- a/2023/21xxx/CVE-2023-21757.json +++ b/2023/21xxx/CVE-2023-21757.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-476: NULL Pointer Dereference", + "cweId": "CWE-476" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21758.json b/2023/21xxx/CVE-2023-21758.json index 748192a730f..da3480c73a5 100644 --- a/2023/21xxx/CVE-2023-21758.json +++ b/2023/21xxx/CVE-2023-21758.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-476: NULL Pointer Dereference", + "cweId": "CWE-476" } ] } diff --git a/2023/21xxx/CVE-2023-21760.json b/2023/21xxx/CVE-2023-21760.json index 054f0962016..ac3ffddd57b 100644 --- a/2023/21xxx/CVE-2023-21760.json +++ b/2023/21xxx/CVE-2023-21760.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')", + "cweId": "CWE-59" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21761.json b/2023/21xxx/CVE-2023-21761.json index 6e48480d31d..ec398a761b7 100644 --- a/2023/21xxx/CVE-2023-21761.json +++ b/2023/21xxx/CVE-2023-21761.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-918: Server-Side Request Forgery (SSRF)", + "cweId": "CWE-918" } ] } diff --git a/2023/21xxx/CVE-2023-21762.json b/2023/21xxx/CVE-2023-21762.json index cbf5180fa2d..001cb6d5b2d 100644 --- a/2023/21xxx/CVE-2023-21762.json +++ b/2023/21xxx/CVE-2023-21762.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-502: Deserialization of Untrusted Data", + "cweId": "CWE-502" } ] } diff --git a/2023/21xxx/CVE-2023-21763.json b/2023/21xxx/CVE-2023-21763.json index 7ef2571a3a3..ecf43947f89 100644 --- a/2023/21xxx/CVE-2023-21763.json +++ b/2023/21xxx/CVE-2023-21763.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-426: Untrusted Search Path", + "cweId": "CWE-426" } ] } diff --git a/2023/21xxx/CVE-2023-21764.json b/2023/21xxx/CVE-2023-21764.json index cd2cdf651f4..e3fae2af928 100644 --- a/2023/21xxx/CVE-2023-21764.json +++ b/2023/21xxx/CVE-2023-21764.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-426: Untrusted Search Path", + "cweId": "CWE-426" } ] } diff --git a/2023/21xxx/CVE-2023-21765.json b/2023/21xxx/CVE-2023-21765.json index 2993d77cfa3..65700801893 100644 --- a/2023/21xxx/CVE-2023-21765.json +++ b/2023/21xxx/CVE-2023-21765.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21766.json b/2023/21xxx/CVE-2023-21766.json index bf04b0b0f90..783b5d1bff8 100644 --- a/2023/21xxx/CVE-2023-21766.json +++ b/2023/21xxx/CVE-2023-21766.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory", + "cweId": "CWE-591" } ] } diff --git a/2023/21xxx/CVE-2023-21767.json b/2023/21xxx/CVE-2023-21767.json index 7baded6f593..e9af0751e24 100644 --- a/2023/21xxx/CVE-2023-21767.json +++ b/2023/21xxx/CVE-2023-21767.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2023/21xxx/CVE-2023-21768.json b/2023/21xxx/CVE-2023-21768.json index d05e79439db..659590ea90f 100644 --- a/2023/21xxx/CVE-2023-21768.json +++ b/2023/21xxx/CVE-2023-21768.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-822: Untrusted Pointer Dereference", + "cweId": "CWE-822" } ] } diff --git a/2023/21xxx/CVE-2023-21771.json b/2023/21xxx/CVE-2023-21771.json index f895c576717..4f11192b1cc 100644 --- a/2023/21xxx/CVE-2023-21771.json +++ b/2023/21xxx/CVE-2023-21771.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory", + "cweId": "CWE-591" } ] } diff --git a/2023/21xxx/CVE-2023-21772.json b/2023/21xxx/CVE-2023-21772.json index 8c14dbedf76..bc601d3795a 100644 --- a/2023/21xxx/CVE-2023-21772.json +++ b/2023/21xxx/CVE-2023-21772.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21773.json b/2023/21xxx/CVE-2023-21773.json index 60226254ed2..64260d2984f 100644 --- a/2023/21xxx/CVE-2023-21773.json +++ b/2023/21xxx/CVE-2023-21773.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21774.json b/2023/21xxx/CVE-2023-21774.json index 2f9851f3403..fae15228267 100644 --- a/2023/21xxx/CVE-2023-21774.json +++ b/2023/21xxx/CVE-2023-21774.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21776.json b/2023/21xxx/CVE-2023-21776.json index 789a8db9b41..8659a240f89 100644 --- a/2023/21xxx/CVE-2023-21776.json +++ b/2023/21xxx/CVE-2023-21776.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } @@ -274,6 +275,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26321" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/21xxx/CVE-2023-21779.json b/2023/21xxx/CVE-2023-21779.json index 43f35c70bd5..7c83938aee0 100644 --- a/2023/21xxx/CVE-2023-21779.json +++ b/2023/21xxx/CVE-2023-21779.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-502: Deserialization of Untrusted Data", + "cweId": "CWE-502" } ] } diff --git a/2023/21xxx/CVE-2023-21780.json b/2023/21xxx/CVE-2023-21780.json index 95d3645caa9..9d1f4f6444b 100644 --- a/2023/21xxx/CVE-2023-21780.json +++ b/2023/21xxx/CVE-2023-21780.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21781.json b/2023/21xxx/CVE-2023-21781.json index d97e7f9ca49..372ce81fc20 100644 --- a/2023/21xxx/CVE-2023-21781.json +++ b/2023/21xxx/CVE-2023-21781.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21782.json b/2023/21xxx/CVE-2023-21782.json index 7c8159bdfae..494f8b5e3aa 100644 --- a/2023/21xxx/CVE-2023-21782.json +++ b/2023/21xxx/CVE-2023-21782.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21783.json b/2023/21xxx/CVE-2023-21783.json index 095369c4605..8306d462586 100644 --- a/2023/21xxx/CVE-2023-21783.json +++ b/2023/21xxx/CVE-2023-21783.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21784.json b/2023/21xxx/CVE-2023-21784.json index 6c261a44e63..0e0626e15e4 100644 --- a/2023/21xxx/CVE-2023-21784.json +++ b/2023/21xxx/CVE-2023-21784.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2023/21xxx/CVE-2023-21785.json b/2023/21xxx/CVE-2023-21785.json index d76230dabf4..7a98f239dc8 100644 --- a/2023/21xxx/CVE-2023-21785.json +++ b/2023/21xxx/CVE-2023-21785.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21786.json b/2023/21xxx/CVE-2023-21786.json index ed7a043ec6a..46282341186 100644 --- a/2023/21xxx/CVE-2023-21786.json +++ b/2023/21xxx/CVE-2023-21786.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21787.json b/2023/21xxx/CVE-2023-21787.json index ec6232013e3..ec41b1ee9e4 100644 --- a/2023/21xxx/CVE-2023-21787.json +++ b/2023/21xxx/CVE-2023-21787.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21789.json b/2023/21xxx/CVE-2023-21789.json index 463877ea603..9539d147d98 100644 --- a/2023/21xxx/CVE-2023-21789.json +++ b/2023/21xxx/CVE-2023-21789.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-369: Divide By Zero", + "cweId": "CWE-369" } ] } diff --git a/2023/21xxx/CVE-2023-21790.json b/2023/21xxx/CVE-2023-21790.json index 301105bf8d7..e413f46fda2 100644 --- a/2023/21xxx/CVE-2023-21790.json +++ b/2023/21xxx/CVE-2023-21790.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21791.json b/2023/21xxx/CVE-2023-21791.json index 0f8f93da6ec..1f38fae717f 100644 --- a/2023/21xxx/CVE-2023-21791.json +++ b/2023/21xxx/CVE-2023-21791.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21792.json b/2023/21xxx/CVE-2023-21792.json index 33692c42989..640becf857b 100644 --- a/2023/21xxx/CVE-2023-21792.json +++ b/2023/21xxx/CVE-2023-21792.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21793.json b/2023/21xxx/CVE-2023-21793.json index 53e1484093e..30c4e4636bd 100644 --- a/2023/21xxx/CVE-2023-21793.json +++ b/2023/21xxx/CVE-2023-21793.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/21xxx/CVE-2023-21795.json b/2023/21xxx/CVE-2023-21795.json index 9f6b49dc3eb..9a3b496197c 100644 --- a/2023/21xxx/CVE-2023-21795.json +++ b/2023/21xxx/CVE-2023-21795.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } diff --git a/2023/23xxx/CVE-2023-23383.json b/2023/23xxx/CVE-2023-23383.json index ab34d3149e3..5a028b73e6f 100644 --- a/2023/23xxx/CVE-2023-23383.json +++ b/2023/23xxx/CVE-2023-23383.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" } ] } @@ -35,7 +36,19 @@ "product": { "product_data": [ { - "product_name": "Azure Service Fabric", + "product_name": "Azure Service Fabric 9.0 for Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.0.1317.1" + } + ] + } + }, + { + "product_name": "Azure Service Fabric 9.1 for Windows", "version": { "version_data": [ { @@ -45,6 +58,30 @@ } ] } + }, + { + "product_name": "Azure Service Fabric 9.1 for Ubuntu", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.1.1388.1" + } + ] + } + }, + { + "product_name": "Azure Service Fabric 9.0 for Windows", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "9.0", + "version_value": "9.0.1380.9590" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23385.json b/2023/23xxx/CVE-2023-23385.json index ca7b062341f..4625d9221f6 100644 --- a/2023/23xxx/CVE-2023-23385.json +++ b/2023/23xxx/CVE-2023-23385.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,7 +180,19 @@ } }, { - "product_name": "Windows Server 2008", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", "version": { "version_data": [ { @@ -179,14 +204,45 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2008 Service Pack 2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -207,6 +263,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -218,6 +286,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23388.json b/2023/23xxx/CVE-2023-23388.json index 4402ab3e0cf..0f862e9ba73 100644 --- a/2023/23xxx/CVE-2023-23388.json +++ b/2023/23xxx/CVE-2023-23388.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-681: Incorrect Conversion between Numeric Types", + "cweId": "CWE-681" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -153,6 +166,18 @@ } ] } + }, + { + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23389.json b/2023/23xxx/CVE-2023-23389.json index 84bdd2e8b93..fdb738fcd25 100644 --- a/2023/23xxx/CVE-2023-23389.json +++ b/2023/23xxx/CVE-2023-23389.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition", + "cweId": "CWE-367" } ] } diff --git a/2023/23xxx/CVE-2023-23391.json b/2023/23xxx/CVE-2023-23391.json index 6c4408164dd..99a08a857d4 100644 --- a/2023/23xxx/CVE-2023-23391.json +++ b/2023/23xxx/CVE-2023-23391.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-23: Relative Path Traversal", + "cweId": "CWE-23" } ] } @@ -35,7 +36,7 @@ "product": { "product_data": [ { - "product_name": "Microsoft Office", + "product_name": "Microsoft Office for Android", "version": { "version_data": [ { diff --git a/2023/23xxx/CVE-2023-23392.json b/2023/23xxx/CVE-2023-23392.json index 306a2c626bb..b5aa82a627c 100644 --- a/2023/23xxx/CVE-2023-23392.json +++ b/2023/23xxx/CVE-2023-23392.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } @@ -65,7 +66,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } diff --git a/2023/23xxx/CVE-2023-23393.json b/2023/23xxx/CVE-2023-23393.json index 6af8f908f41..d43c99ec675 100644 --- a/2023/23xxx/CVE-2023-23393.json +++ b/2023/23xxx/CVE-2023-23393.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory", + "cweId": "CWE-591" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } diff --git a/2023/23xxx/CVE-2023-23394.json b/2023/23xxx/CVE-2023-23394.json index aac84848175..2e747e4a18f 100644 --- a/2023/23xxx/CVE-2023-23394.json +++ b/2023/23xxx/CVE-2023-23394.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-822: Untrusted Pointer Dereference", + "cweId": "CWE-822" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,7 +180,19 @@ } }, { - "product_name": "Windows Server 2008", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", "version": { "version_data": [ { @@ -179,14 +204,45 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2008 Service Pack 2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -207,6 +263,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -218,6 +286,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23395.json b/2023/23xxx/CVE-2023-23395.json index 8bc0f27ca2b..88441e3c198 100644 --- a/2023/23xxx/CVE-2023-23395.json +++ b/2023/23xxx/CVE-2023-23395.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')", + "cweId": "CWE-601" } ] } diff --git a/2023/23xxx/CVE-2023-23396.json b/2023/23xxx/CVE-2023-23396.json index 5b0115773a1..5c6e4bd5080 100644 --- a/2023/23xxx/CVE-2023-23396.json +++ b/2023/23xxx/CVE-2023-23396.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Denial of Service" + "value": "CWE-400: Uncontrolled Resource Consumption", + "cweId": "CWE-400" } ] } @@ -47,7 +48,7 @@ } }, { - "product_name": "Microsoft Office Web Apps Server", + "product_name": "Microsoft Office Web Apps Server 2013 Service Pack 1", "version": { "version_data": [ { diff --git a/2023/23xxx/CVE-2023-23397.json b/2023/23xxx/CVE-2023-23397.json index 22cd7c27ea2..35abef7b348 100644 --- a/2023/23xxx/CVE-2023-23397.json +++ b/2023/23xxx/CVE-2023-23397.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } @@ -35,7 +36,7 @@ "product": { "product_data": [ { - "product_name": "Microsoft Office", + "product_name": "Microsoft Office LTSC 2021", "version": { "version_data": [ { @@ -47,18 +48,13 @@ } }, { - "product_name": "Microsoft Outlook", + "product_name": "Microsoft Outlook 2016", "version": { "version_data": [ { "version_affected": "<", "version_name": "16.0.0.0", "version_value": "16.0.5387.1000" - }, - { - "version_affected": "<", - "version_name": "15.0.0.0", - "version_value": "15.0.5537.1000" } ] } @@ -74,6 +70,30 @@ } ] } + }, + { + "product_name": "Microsoft Office 2019", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "19.0.0", + "version_value": "https://aka.ms/OfficeSecurityReleases" + } + ] + } + }, + { + "product_name": "Microsoft Outlook 2013 Service Pack 1", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "15.0.0.0", + "version_value": "15.0.5537.1000" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23398.json b/2023/23xxx/CVE-2023-23398.json index 3eb99a10eaf..be8f38fbde7 100644 --- a/2023/23xxx/CVE-2023-23398.json +++ b/2023/23xxx/CVE-2023-23398.json @@ -35,12 +35,12 @@ "product": { "product_data": [ { - "product_name": "Microsoft Office", + "product_name": "Microsoft Office 2019", "version": { "version_data": [ { "version_affected": "<", - "version_name": "16.0.1", + "version_name": "19.0.0", "version_value": "https://aka.ms/OfficeSecurityReleases" } ] @@ -59,14 +59,33 @@ } }, { - "product_name": "Microsoft Excel", + "product_name": "Microsoft Office LTSC 2021", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "16.0.1", + "version_value": "https://aka.ms/OfficeSecurityReleases" + } + ] + } + }, + { + "product_name": "Microsoft Excel 2016", "version": { "version_data": [ { "version_affected": "<", "version_name": "16.0.0.0", "version_value": "16.0.5387.1000" - }, + } + ] + } + }, + { + "product_name": "Microsoft Excel 2013 Service Pack 1", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "15.0.0.0", diff --git a/2023/23xxx/CVE-2023-23399.json b/2023/23xxx/CVE-2023-23399.json index 6d93fb9327f..5545bafcc8d 100644 --- a/2023/23xxx/CVE-2023-23399.json +++ b/2023/23xxx/CVE-2023-23399.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } @@ -35,23 +36,25 @@ "product": { "product_data": [ { - "product_name": "Microsoft Office", + "product_name": "Microsoft Office 2019", "version": { "version_data": [ { "version_affected": "<", - "version_name": "16.0.1", + "version_name": "19.0.0", "version_value": "https://aka.ms/OfficeSecurityReleases" - }, + } + ] + } + }, + { + "product_name": "Microsoft Office 2019 for Mac", + "version": { + "version_data": [ { "version_affected": "<", - "version_name": "16.0.0.0", - "version_value": "16.0.5387.1000" - }, - { - "version_affected": "<", - "version_name": "15.0.0.0", - "version_value": "15.0.5537.1000" + "version_name": "16.0.0", + "version_value": "16.71.23031200" } ] } @@ -81,14 +84,57 @@ } }, { - "product_name": "Microsoft Excel", + "product_name": "Microsoft Office LTSC for Mac 2021", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "16.0.1", + "version_value": "16.71.23031200" + } + ] + } + }, + { + "product_name": "Microsoft Office LTSC 2021", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "16.0.1", + "version_value": "https://aka.ms/OfficeSecurityReleases" + } + ] + } + }, + { + "product_name": "Microsoft Excel 2016", "version": { "version_data": [ { "version_affected": "<", "version_name": "16.0.0.0", "version_value": "16.0.5387.1000" - }, + } + ] + } + }, + { + "product_name": "Microsoft Office 2016", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "16.0.0", + "version_value": "16.0.5387.1000" + } + ] + } + }, + { + "product_name": "Microsoft Excel 2013 Service Pack 1", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "15.0.0.0", @@ -98,7 +144,19 @@ } }, { - "product_name": "Microsoft Office Web Apps Server", + "product_name": "Microsoft Office 2013 Service Pack 1", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "15.0.0", + "version_value": "15.0.5537.1000" + } + ] + } + }, + { + "product_name": "Microsoft Office Web Apps Server 2013 Service Pack 1", "version": { "version_data": [ { diff --git a/2023/23xxx/CVE-2023-23400.json b/2023/23xxx/CVE-2023-23400.json index fce0d29ce8e..22577d790fb 100644 --- a/2023/23xxx/CVE-2023-23400.json +++ b/2023/23xxx/CVE-2023-23400.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } @@ -46,6 +47,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -70,6 +83,18 @@ ] } }, + { + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -81,6 +106,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23401.json b/2023/23xxx/CVE-2023-23401.json index b7e629ce04e..9ea1263d98b 100644 --- a/2023/23xxx/CVE-2023-23401.json +++ b/2023/23xxx/CVE-2023-23401.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-681: Incorrect Conversion between Numeric Types", + "cweId": "CWE-681" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,14 +180,33 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -195,6 +227,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -206,6 +250,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23402.json b/2023/23xxx/CVE-2023-23402.json index 3a0f132d1fb..90571231535 100644 --- a/2023/23xxx/CVE-2023-23402.json +++ b/2023/23xxx/CVE-2023-23402.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-415: Double Free", + "cweId": "CWE-415" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,14 +180,33 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -195,6 +227,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -206,6 +250,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23403.json b/2023/23xxx/CVE-2023-23403.json index b721674ef1e..040754b88ab 100644 --- a/2023/23xxx/CVE-2023-23403.json +++ b/2023/23xxx/CVE-2023-23403.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -166,6 +179,18 @@ ] } }, + { + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { @@ -178,6 +203,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -189,6 +226,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23404.json b/2023/23xxx/CVE-2023-23404.json index 9ed35ac497c..ec0571d33cd 100644 --- a/2023/23xxx/CVE-2023-23404.json +++ b/2023/23xxx/CVE-2023-23404.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -166,6 +179,18 @@ ] } }, + { + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { @@ -178,6 +203,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -189,6 +226,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23405.json b/2023/23xxx/CVE-2023-23405.json index 89af285e788..b135090bcea 100644 --- a/2023/23xxx/CVE-2023-23405.json +++ b/2023/23xxx/CVE-2023-23405.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,7 +180,19 @@ } }, { - "product_name": "Windows Server 2008", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", "version": { "version_data": [ { @@ -179,14 +204,45 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2008 Service Pack 2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -207,6 +263,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -218,6 +286,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23406.json b/2023/23xxx/CVE-2023-23406.json index 2260ae82574..dad89ac2e4e 100644 --- a/2023/23xxx/CVE-2023-23406.json +++ b/2023/23xxx/CVE-2023-23406.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -166,6 +179,18 @@ ] } }, + { + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { @@ -178,6 +203,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -189,6 +226,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23407.json b/2023/23xxx/CVE-2023-23407.json index 14c134406a7..175c82c73c8 100644 --- a/2023/23xxx/CVE-2023-23407.json +++ b/2023/23xxx/CVE-2023-23407.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory", + "cweId": "CWE-591" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,14 +180,33 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -195,6 +227,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -206,6 +250,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23408.json b/2023/23xxx/CVE-2023-23408.json index b421fbbdf05..e78c51cf2b4 100644 --- a/2023/23xxx/CVE-2023-23408.json +++ b/2023/23xxx/CVE-2023-23408.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Spoofing" + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" } ] } @@ -35,7 +36,7 @@ "product": { "product_data": [ { - "product_name": "Azure HDInsights", + "product_name": "Azure HDInsight", "version": { "version_data": [ { @@ -72,7 +73,7 @@ "version": "3.1", "baseSeverity": "MEDIUM", "baseScore": 4.5, - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C" + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C" } ] } diff --git a/2023/23xxx/CVE-2023-23409.json b/2023/23xxx/CVE-2023-23409.json index 08c05a3b5e7..8dd13a37c78 100644 --- a/2023/23xxx/CVE-2023-23409.json +++ b/2023/23xxx/CVE-2023-23409.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,7 +180,19 @@ } }, { - "product_name": "Windows Server 2008", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", "version": { "version_data": [ { @@ -179,14 +204,45 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2008 Service Pack 2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -207,6 +263,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -218,6 +286,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23410.json b/2023/23xxx/CVE-2023-23410.json index d8e32fa9aeb..2e95817e6f1 100644 --- a/2023/23xxx/CVE-2023-23410.json +++ b/2023/23xxx/CVE-2023-23410.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,7 +180,19 @@ } }, { - "product_name": "Windows Server 2008", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", "version": { "version_data": [ { @@ -179,14 +204,45 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2008 Service Pack 2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -207,6 +263,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -218,6 +286,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23411.json b/2023/23xxx/CVE-2023-23411.json index f6f5538b73b..75963437ad8 100644 --- a/2023/23xxx/CVE-2023-23411.json +++ b/2023/23xxx/CVE-2023-23411.json @@ -58,6 +58,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -70,18 +82,6 @@ ] } }, - { - "product_name": "Windows 10 Version 20H2", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "10.0.0", - "version_value": "10.0.19042.2728" - } - ] - } - }, { "product_name": "Windows 11 version 21H2", "version": { @@ -113,7 +113,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -165,6 +165,18 @@ } ] } + }, + { + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23412.json b/2023/23xxx/CVE-2023-23412.json index 5430e06af19..4fef3afd132 100644 --- a/2023/23xxx/CVE-2023-23412.json +++ b/2023/23xxx/CVE-2023-23412.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-269: Improper Privilege Management", + "cweId": "CWE-269" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -142,6 +155,18 @@ ] } }, + { + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { @@ -154,6 +179,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -165,6 +202,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23413.json b/2023/23xxx/CVE-2023-23413.json index 914f8255911..7a92d19649e 100644 --- a/2023/23xxx/CVE-2023-23413.json +++ b/2023/23xxx/CVE-2023-23413.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-908: Use of Uninitialized Resource", + "cweId": "CWE-908" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -166,6 +179,18 @@ ] } }, + { + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { @@ -178,6 +203,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -189,6 +226,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23414.json b/2023/23xxx/CVE-2023-23414.json index 0e74c215306..e3c58c04da2 100644 --- a/2023/23xxx/CVE-2023-23414.json +++ b/2023/23xxx/CVE-2023-23414.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory", + "cweId": "CWE-591" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,14 +180,33 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -195,6 +227,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -206,6 +250,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] } diff --git a/2023/23xxx/CVE-2023-23415.json b/2023/23xxx/CVE-2023-23415.json index 65b1f9dc134..4f6bbfe81e9 100644 --- a/2023/23xxx/CVE-2023-23415.json +++ b/2023/23xxx/CVE-2023-23415.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } @@ -58,6 +59,18 @@ ] } }, + { + "product_name": "Windows Server 2019 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.17763.4131" + } + ] + } + }, { "product_name": "Windows Server 2022", "version": { @@ -113,7 +126,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } @@ -167,7 +180,19 @@ } }, { - "product_name": "Windows Server 2008", + "product_name": "Windows Server 2016 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.0.14393.5786" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", "version": { "version_data": [ { @@ -179,14 +204,45 @@ } }, { - "product_name": "Windows Server 2008 R2", + "product_name": "Windows Server 2008 Service Pack 2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 Service Pack 2", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.0.6003.21966" + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.1.0", "version_value": "6.1.7601.26415" - }, + } + ] + } + }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ { "version_affected": "<", "version_name": "6.0.0", @@ -207,6 +263,18 @@ ] } }, + { + "product_name": "Windows Server 2012 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.2.0", + "version_value": "6.2.9200.24168" + } + ] + } + }, { "product_name": "Windows Server 2012 R2", "version": { @@ -218,6 +286,18 @@ } ] } + }, + { + "product_name": "Windows Server 2012 R2 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.3.0", + "version_value": "6.3.9600.20865" + } + ] + } } ] }